DOC PREVIEW
Pitt IS 2150 - Authentication Identity Vulnerability Analysis

This preview shows page 1-2-16-17-18-33-34 out of 34 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 34 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 34 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 34 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 34 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 34 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 34 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 34 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 34 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

IS 2150 / TEL 2810 Introduction to SecurityObjectivesSlide 3What is Authentication?Authentication System: DefinitionAuthentication System: PasswordsPasswordsAuthentication SystemAttacks on PasswordsPassword SelectionSlide 11Slide 12Authentication Systems: Challenge-ResponseSlide 14Authentication Systems: BiometricsAttacks on BiometricsSlide 17Vulnerability AnalysisTechniques for Detecting VulnerabilitiesTypes/layers of Penetration TestingRed Team Approach Flaw Hypothesis Methodology:Problems with Penetration TestingVulnerability ClassificationExample flaw: xterm logExample: Finger Daemon (exploited by Morris worm)RISOS:Research Into Secure Operating Systems (7 Classes)Protection Analysis Model ClassesPA flaw classesNRL TaxonomyNRL Taxonomy (Genesis)NRL Taxonomy: TimeNRL Taxonomy: LocationAslam’s ModelCommon Vulnerabilities and Exposures (cve.mitre.org)1IS 2150 / TEL 2810Introduction to SecurityJames JoshiAssociate Professor, SISLecture 10Nov 15, 2011Authentication, IdentityVulnerability Analysis2ObjectivesUnderstand/explain the issues related to, and utilize the techniques Authentication and identificationVulnerability analysis/classificationTechniquesTaxonomy3Authentication and Identity4What is Authentication?Authentication: Binding identity and external entity to subjectHow do we do it?Entity knows something (secret)Passwords, id numbersEntity has somethingBadge, smart cardEntity is something Biometrics: fingerprints or retinal characteristicsEntity is in someplaceSource IP, restricted area terminal5Authentication System:DefinitionA: Set of authentication informationused by entities to prove their identities (e.g., password)C: Set of complementary informationused by system to validate authentication information (e.g., hash of a password or the password itself)F: Set of complementation functions (to generate C)f : A → CGenerate appropriate c  C given a  AL: set of authentication functionsl: A  C → { true, false }verify identityS: set of selection functionsGenerate/alter A and C e.g., commands to change password6Authentication System: PasswordsExample: plaintext passwordsA = C = alphabet*f returns argument: f(a) returns al is string equivalence: l(a, b) is true if a = bComplementation FunctionNull (return the argument as above)requires that c be protected; i.e. password file needs to be protectedOne-way hash – function such thatComplementary information c = f(a) easy to computef-1(c) difficult to compute7PasswordsExample: Original Unix A password is up to eight characters each character could be one of 127 possible characters; A contains approx. 6.9 x 1016 passwordsPassword is hashed using one of 4096 functions into a 11 character string2 characters pre-pended to indicate the hash function usedC contains passwords of size 13 characters, each character from an alphabet of 64 charactersApproximately 3.0 x 1023 stringsStored in file /etc/passwd (all can read)8Authentication SystemGoal: identify the entities correctlyApproaches to protectingHide enough information so that one of a, c or f cannot be foundMake C readable only to root Make F unknownPrevent access to the authentication functions Lroot cannot log in over the network9Attacks on PasswordsDictionary attack: Trial and error guessingType 1: attacker knows A, F, CGuess g and compute f(g) for each f in FType 2: attacker knows A, ll returns True for guess gCounter: Difficulty based on |A|, TimeProbability P of breaking a passwordG be the number of guesses that can be tested in one time unit|A| ≥ TG/PAssumptions: time constant; all passwords are equally likely10Password SelectionRandomDepends on the quality of random number generator; Size of legal passwords8 characters: humans can remember only onePronounceable nonsenseBased on unit of sound (phoneme)Easier to rememberUser selection (proactive selection)Controls on allowableAt least 1 digit, 1 letter, 1 punctuation, 1 control characterObscure poem verse11Password SelectionReusable Passwords susceptible to dictionary attack (type 1)Salting can be used to increase effort neededmakes the choice of complementation function a function of randomly selected dataRandom data is different for different userAuthentication function is chosen on the basis of the saltMany Unix systems: A salt is randomly chosen from 0..4095Complementation function depends on the salt12Password SelectionPassword agingChange password after some time: based on expected time to guess a passwordDisallow change to previous n passwordsFundamental problem is reusabilityReplay attack is easySolution: Authenticate in such a way that the transmitted password changes each time13Authentication Systems: Challenge-ResponsePass algorithmauthenticator sends message msubject responds with f(m)f is a secret encryption functionExample: ask for second input based on some algorithm14Authentication Systems: Challenge-ResponseOne-time password: invalidated after usef changes after useS/Key uses a hash function (MD4/MD5)User chooses an initial seed kKey generator calculatesk1 = h(k), k2 = h(k1) …, kn = h(kn-1)Passwords used in the orderp1 = kn, p2 = kn-1, …, pn =k1 Suppose p1 = kn is intercepted; the next password is p2 = kn-1Since h(kn-1) = kn, the attacker needs to invert h to determine the next password15Authentication Systems: BiometricsUsed for human subject identification based on physical characteristics that are tough to copyFingerprint (optical scanning)Camera’s needed (bulky)VoiceSpeaker-verification (identity) or speaker-recognition (info content)Iris/retina patterns (unique for each person)Laser beaming is intrusiveFace recognitionFacial features can make this difficultKeystroke interval/timing/pressure16Attacks on BiometricsFake biometricsfingerprint “mask”copy keystroke patternFake the interaction between device and systemReplay attackRequires careful design of entire authentication system17Vulnerability Analysis18Vulnerability AnalysisVulnerability or security flaw: specific failures of security controls (procedures, technology or management)Errors in codeHuman violatorsMismatch between


View Full Document

Pitt IS 2150 - Authentication Identity Vulnerability Analysis

Documents in this Course
QUIZ

QUIZ

8 pages

Assurance

Assurance

40 pages

Load more
Download Authentication Identity Vulnerability Analysis
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Authentication Identity Vulnerability Analysis and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Authentication Identity Vulnerability Analysis 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?